
Sökresultat:
2133 Uppsatser om Computer security - Sida 6 av 143
Sa?kerhet och integritet i webbapplikationer : En orientering o?ver sa?ker utveckling
The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.This study?s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject.
Kvinnor, datorspel och identifikation : en genusanalys av två datorspel och två kvinnors datorspelande
This essay covers computer gaming as seen from a perspective of gender theory. The main purpose of the essay is to examine women?s relationship to computer games, and more specifically women?s attitudes to the games they play. The theoretical basis for this essay is sprung from a hermeneutic perspective. The empirical basis for analysis consists of two in depth interviews and game analysis of the two computer games Counter Strike and Final Fantasy XI.
Sveriges säkerhetspolitik under 2000-talet : En analys ur ett liberalt och ett realistiskt perspektiv
The purpose of this study was to examine and explain Sweden?s defence and security policy during the twenty-first century. The method that was used in this research was a case study. The material that was used were government documents focusing on this area of policy, and numerous books concerning the theoretical perspectives on international relations and defence security policy. The study is of an explaining art and the analysis explains Sweden?s security and defence policy during the twenty-first century. The analysis explains this by testing it against a liberal and a realist view on international relations. The conclusion of the study is that Sweden?s defence and security policy has been liberal during this time period ? and still is.
En actionberättelse : en analys av de narrativa delarna i actiondatorspelet Halo
This essay is a narrative analyze of the computer game Halo. The purpose of the essay is to see what function the narrative elements have in a computer game of the action genre. The analyze is done with a neo-formalistic approach according to the theory of David Bordwell and Kristin Thompson. The choice of game was based on it's positive reviews mentioning the story. The essay tries to give a picture of research in the field and researchers views on narratives and computer games.
Möjligheter och begränsningar i molnet
Idag väljer många företag och kommuner att placera data i molnet istället för
på en lokal server, detta medför nya problem som tidigare inte varit aktuella.
Datainspektionen har påpekat brister i hur två kommuner använder molntjänster
för att lagra personlig data då de ställer sig tveksamma till
molnleverantörernas hantering av data samt insynen till molnleverantörerena.
I detta arbete kommer det undersökas hur den svenska personuppgiftslagen
fungerar när data läggs ut i en molntjänst. Resultatet av uppsatsen kommer även
visa på de olika säkerhetshoten som finns i molnet och se vad säkerhetsexperter
säger för att ta reda på om kommuner och företag är medvetna om och
uppmärksammar samma hot. För att ta reda på detta har intervjuer genomförts med
en svensk molnleverantör, företag som utvecklar tjänster mot molnet,
privatpersoner som nyttjar molnet och experter inom säkerhet från Blekinge
Tekniska Högskola, BTH.
Resultatet av studien visar att det är svårt att se om en amerikansk leverantör
uppfyller de svenska lagarna för personuppgifter, det visar också att det är
teoretiskt möjligt att anlita en svensk leverantör och uppfylla lagen. Det har
även visat sig att den största oron gällande molnet är bristen på kontroll av
data..
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..
Att vinna eller försvinna när alla får varsin dator : En-till-en-satsningar och dess inverkan på delaktighet, självbild och lärande för gymnasieelever i behov av särskilt stöd
The purpose of this study was to investigate how high school students felt that the computer helped or hindered participation and self-esteem in the learning situation and if the students experienced any differences between when they had been relatively alone in using a computer compared to when everyone had their own computer. The starting point was the national one-to-one projects made to give every student access to a personal computer and how it affected students in special educational needs and previous research. The theoretical approach was based on socioculture/activity theory and theories of self-esteem. Ten high school students in grade one at a senior high school that previously had started up a one-to-one project was interviewed. The results showed that the students primarily used the computer to write and to search the Internet, but even as a alternative or compensatory tool.
Betalningssätt via webben : En studie om konsumenters ansedda kunskap angående olika betalningssätt via webben och deras säkerhet
The e-commerce in Sweden has increased each year for the past several years, but still just over half of all the consumers feels worry about payment security. This could be the reason why over half of the consumers just shopped about one time on the Internet during the whole year of 2009. Another reason could be that the many consumers have a lack of trust to the different payment methods that are available during payment on the Internet, because they might don't possess enough knowledge regarding the payment methods and their security. If the consumers were to gain more knowledge about the payment methods and their security, it may lead to that the they would feel more comfortable when shopping online, and do it more frequently. It is this that will be investigated in this paper.The purpose of the paper is to research if consumers believed knowledge concerning the different payment methods available on the web and their security influence the consumers trust in the payment methods.
Det etniska säkerhetsdilemmat-en idealtypsanalys över etniska konflikter
In the world after the Cold War, internal and ethnic conflicts have been predominant. Ethnic conflicts have their own theories on why they erupt and what can be done to solve them. This essay seeks to analyze how the Ethnic Security Dilemma can explain the causes, and possible solutions, of today´s armed ethnic conflicts.By making an ideal types typology over different types of ethnic conflicts, and then analyzing the Ethnic Security Dilemma´s impact on each conflict type.
Produktplacering i videospel och dess påverkan på spelarnas attityd, återkallelse samt uppmärksamhet gentemot varumärken.
The gaming market is growing and the number of people, men and women, who play computer games, is also increasing every day. In addition, computer games are also interactive media which leads to the fact that product placement in computer games attracts and is used more frequently by marketers. It is therefore important for marketers and game developers to understand how product placement in computer games affects players' attention and attitude towards the brand or product that is product placed. We therefore examine how product placement in computer games affects players' recall of and attitude towards the brand. The aim is to help companies and game developers to see the effect of product placement in computer games on players and thus product place more efficiently.
EU-patent på datorrelaterade uppfinningar : en rättsekonomisk analys
Computer programs must give a technical effect that goes beyond"normal physical interaction"to be considered to belong to a technical field. The invention shall be be susceptible of industrial application, which means that it should be possible to reproduce or use in any other industrial way. The reqirement that the invention shall be new means that the technique must not be previously known because of patents, published articles, etc. That an invention shall be a contribution to the state of the art in a technical field means that the invention shall not be obvious to invent for a person skilled in the art. Patents do effect the innovation among the inventers, but in most industries most inventions would be invented independent if there was a patent system or not.
Riskhanteringens utmaning : En studie som identifierar svenska organisationers riskhantering avseende informationssäkerhet samt dess prioritering.
Background: Risk Management plays an important part of the enterprises strategic business activity. Efficient Risk Management will secure the businesses survival, assets and creates market advantages. The interest of information security has consequently gained in Swedish corporations. Corporations have realized the importance of the information which is stored in the IT systems. IT is the tool for businesses future progress and growth and therefore a source of risks.
Webbdesign för iPhone
Detta kandidatarbete utgår ifrån vilka aspekter som är viktiga att tänka på när
man anpassar av en webbsida till en mobil enhet och de problem som uppstår när
en
webbsida skalas ner till en låg skärmupplösning. Vi har behandlat
användarvänlighet, designprinciper, grafiska element och tekniska aspekter för
att svara på problemformuleringen. Slutsatsen vi kommit fram till är ett antal
punkter inom områdena ovan..
Säkerhetspolitik, Medborgare & Frihet
The terror attack in New York year 2001 was a turning point in international politics. New policies were reformed in both USA and EU to secure their citizens from terrorism. The power of the institutions has developed and the question is; how does the new security policy affect people?s freedom? Is it the agencies new policies that are restricting the freedom or the actions of a terrorist? The purpose of this study is to examine if the security policies in USA and EU are protecting their citizen?s freedom. Many individuals are not aware of how much the security policies are affecting their lives.
Informationssäkerhet i arkitekturbeskrivningar : En studie i hur säkerhetsfunktioner kan beskrivas med hjälp av vyer
Information security is an essential part of all information systems; especially in large organizations and companies dealing with classified material. Every large information system has an architecture that includes many parts that together form an Enterprise Architecture. The aim of this thesis is to study how to describe several security functions in an Enterprise Architecture and also how to ensure accountability between requirements and the implementation of the security functions. The description is for stakeholders on a conceptual level rather than a technical level. The study has been carried out by comparing the theoretical framework that has been formed by a study of the literature, and the empirical framework that has been formed by a group discussion and interviews with Information Security Consultants from Combitech AB.